ContiÍÅ»ïÉù³Æ¶Ô¸ç˹´ïÀè¼ÓÕþ¸®»ù´¡ÉèÊ©µÄ¹¥»÷ÂôÁ¦
Ðû²¼Ê±¼ä 2022-04-251¡¢ContiÍÅ»ïÉù³Æ¶Ô¸ç˹´ïÀè¼ÓÕþ¸®»ù´¡ÉèÊ©µÄ¹¥»÷ÂôÁ¦
¾ÝýÌå4ÔÂ22ÈÕ±¨µÀ£¬ÀÕË÷ÍÅ»ïContiÉù³Æ¶Ô¸ç˹´ïÀè¼ÓÕþ¸®»ù´¡ÉèÊ©µÄ¹¥»÷ÂôÁ¦¡£¹¥»÷·¢ÉúÔÚÉÏÖÜ£¬Ó°ÏìÁË°üÂÞ²ÆÕþ²¿ºÍÀ͹¤²¿ÔÚÄڵĶà¸ö²¿ÃÅ¡£¾ÝϤ£¬×î³õµÄ¹¥»÷ÆÈʹ²ÆÕþ²¿¹Ø±ÕÆäϵͳ³¤´ïÊýСʱ£¬¸ÃϵͳÂôÁ¦Ö§¸¶¸Ã¹ú´ó²¿ÃŹ«ÎñÔ±µÄн³ê£¬Í¬Ê±Ò²´¦ÖÃÕþ¸®ÑøÀϽðÖ§¸¶¡£Ä¿Ç°£¬ContiÒѹûÈ»ÁË50%µÄ±»µÁÊý¾Ý¡£¸ç˹´ïÀè¼Ó×ÜͳÌåÏÖ£¬ËûÃDz»»áÏòÍøÂç¹¥»÷ÍÅ»ïÖ§¸¶Êê½ð¡£
https://securityaffairs.co/wordpress/130505/cyber-crime/costa-rica-conti-ransomware.html
2¡¢Altahrea Team DDoS¹¥»÷ÒÔÉ«Áлú³¡¹ÜÀí¾ÖIAAµÄÍøÕ¾
¾Ý4ÔÂ21ÈÕ±¨µÀ£¬ÒÔÉ«Áлú³¡¹ÜÀí¾ÖIAA³ÆÆäÍøÕ¾Ôâµ½ÁËDDoS¹¥»÷¡£¾ÝϤ£¬´Ë´Î¹¥»÷À´×ÔÓëÒÁÀÊÓйصĺڿÍ×éÖ¯Altahrea Team£¬Ö¼ÔÚÅê»÷ÃÀ¹úÓÚ1ÔÂ3ÈÕ½øÐеľüÊ»¡£IAAÌåÏÖ£¬Æä²Ù×÷ϵͳºÍÍøÂçûÓÐÊܵ½ÈκÎÓ°Ïì¡£ÔÚ´Ë֮ǰ£¬¾ÝYnet±¨µÀ£¬3ÔÂ15ÈÕÔøÓжà¸öÒÔÉ«Áйٷ½ÍøÕ¾·þÎñÖжϣ¬¿ÉÄÜÊÇÓëÒÁÓйصĹ¥»÷Õß½øÐеĴó¹æÄ£ÍøÂç¹¥»÷¡£
https://www.jns.org/report-pro-iran-hackers-target-israel-airports-authority-website/
3¡¢ÎÚ¿ËÀ¼CERT-UA·¢ÏÖÒÔ¡°Azovstal¡±ÎªÖ÷ÌâµÄµöÓã»î¶¯
ýÌå4ÔÂ23Èճƣ¬ÎÚ¿ËÀ¼¼ÆËã»úÓ¦¼±ÏìӦС×é(CERT-UA)Ðû²¼ÁËÐÂÒ»ÂÖµöÓã»î¶¯µÄÄþ¾²Í¨¸æ¡£´Ë´Î»î¶¯ÒÔ¡°Azovstal¡±ÎªÖ÷Ì⣬ʹÓÃÁ˶ñÒâofficeÎļþ¡£´ò¿ªÎļþ²¢ÆôÓúêºó£¬Ëü½«ÔÚ´ÅÅÌÉÏ´´½¨²¢ÔËÐжñÒâDLL¡°pe.dll¡±£¬×îºóÖ¼ÔÚ°²×°Cobalt Strike Beacon£¬ÓÃÓÚ¿ØÖÆÄ¿±êϵͳ¡£Ñо¿ÈËԱͨ¹ý·ÖÎö¹¥»÷ÖÐʹÓõļÓÃܼ¼Êõ£¬Íƶϴ˴λÓëºÚ¿ÍÍÅ»ïTrickbotÓйء£¸Ãͨ¸æ»¹ÌṩÁ˹ØÓڴ˴λµÄIoCÒÔ¼°·ÀÓù½¨Òé¡£
https://securityaffairs.co/wordpress/130515/cyber-warfare-2/ukraine-cert-warns-azovstal-themed-phishing.html
4¡¢ÃÀ¹úʳƷ¹«Ë¾Bob's Red Mill֪ͨ¿Í»§ÆäÐÅÏ¢ÒѾй¶
ýÌå4ÔÂ21ÈÕ±¨µÀ£¬ÃÀ¹úÈ«ÂóʳƷ¹«Ë¾Bob's Red Mill֪ͨÔÚÏß¿Í»§£¬ÆäÐÅÏ¢ÒѾй¶¡£Í¨ÖªÖÐдµÀ£¬¸Ã¹«Ë¾×î½ü·¢ÏÖÔÚ2ÔÂ23ÈÕÖÁ3ÔÂ1ÈÕÆڼ䣬¹¥»÷ÕßʹÓöñÒâÈí¼þÇÔÈ¡ÆäÍøÕ¾ÖеÄÖ§¸¶ÐÅÏ¢¡£´Ë´Îʼþ¿ÉÄÜй¶ÁËÔÚÏß¿Í»§µÄÖ§¸¶¿¨ÐÅÏ¢¡¢Õ˵¥¡¢ËÍ»õµØÖ·¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂëºÍ¹ºÖýð¶îµÈ¡£¸Ã¹«Ë¾ÌåÏÖ£¬ÒÑÓкܶàÖ÷¹Ë³ÂËßËûÃÇÔâµ½ÁËÆÛÕ©ÐÔÏû·Ñ£¬ËäÈ»²»ÖªµÀÕâЩʼþÊÇ·ñÓëÊý¾ÝÇÔÈ¡Óйأ¬µ«ÏÖÔÚ¿´À´£¬Ö§¸¶¿¨ÐÅÏ¢¿ÉÄÜÒѾй¶¡£
https://www.infosecurity-magazine.com/news/bobs-red-mill-reports-data-breach/
5¡¢CrowdStrikeÐû²¼¹ØÓÚ½©Ê¬ÍøÂçLemonDuckµÄ·ÖÎö³ÂËß
4ÔÂ21ÈÕ£¬CrowdStrikeÐû²¼Á˹ØÓÚ½©Ê¬ÍøÂçLemonDuckµÄ·ÖÎö³ÂËß¡£³ÂËßÖ¸³ö£¬½©Ê¬ÍøÂçÔËÓªÍÅ»ïLemonDuckÀûÓÃLinux·þÎñÆ÷ÉϵÄDocker API½øÐдó¹æÄ£MoneroÍÚ¿ó»î¶¯¡£LemonDuckͨ¹ý·ÃÎÊ̻¶µÄDocker API²¢ÔËÐжñÒâÈÝÆ÷À´ÏÂÔØαװ³ÉPNGͼÏñµÄBash½Å±¾£¬Ëü»¹»áͨ¹ý½ûÓð¢ÀïÔƵļà¿Ø·þÎñÀ´Èƹý¼ì²â¡£Óë´Ëͬʱ£¬Cisco TalosÒ²Åû¶ÁËÒ»¸öÓëTeamTNTÓйصĹ¥»÷»î¶¯£¬Õë¶ÔAmazon Web ServicesÉÏ̻¶µÄDocker API¡£
https://www.crowdstrike.com/blog/lemonduck-botnet-targets-docker-for-cryptomining-operations/
6¡¢Unit 42Ðû²¼¹ØÓÚÀÕË÷Èí¼þBlackByteµÄ·ÖÎö³ÂËß
Unit 42ÔÚ4ÔÂ21ÈÕÐû²¼Á˹ØÓÚÀÕË÷Èí¼þBlackByteµÄ·ÖÎö³ÂËß¡£BlackByteÊÇÒ»ÖÖRaaS£¬ÓÚ2021Äê7ÔÂÊ״ηºÆ𣬹¥»÷ÕßÖ÷ÒªÀûÓÃProxyShell©¶´¡£¸ÃÀÕË÷Èí¼þµÄ»î¶¯Ò»Ö±·Ç³£»îÔ¾£¬×Ô2021Äê11ÔÂÒÔÀ´£¬Õë¶ÔÈ«ÇòµÄ¶à¸ö×éÖ¯£¬Éæ¼°ÄÜÔ´¡¢Å©ÒµºÍ½ðÈÚ·þÎñµÈÐÐÒµ¡£Unit 42ÔÚÒ°Íâ¼ì²âµ½ÁËËüµÄ¶à¸ö±äÌ壬°üÂÞÓÃGoºÍÓÃ.NET±àдµÄ£¬ÒÔ¼°ÓÃGoºÍC»ìºÏ±àдµÄ±äÌå¡£BlackByteÓëLockbit 2.0µÈÀÕË÷Èí¼þÓÐÏàËÆÖ®´¦£¬ËüÃǶ¼ÈƹýÁËʹÓöíÓïµÈ¶àÖÖ¶«Å·ÓïÑÔµÄϵͳ¡£
https://unit42.paloaltonetworks.com/blackbyte-ransomware/